KR20090015417A - Method for providing of hacking game in a based shopping mall and record medium thereof - Google Patents

Method for providing of hacking game in a based shopping mall and record medium thereof Download PDF

Info

Publication number
KR20090015417A
KR20090015417A KR1020070079721A KR20070079721A KR20090015417A KR 20090015417 A KR20090015417 A KR 20090015417A KR 1020070079721 A KR1020070079721 A KR 1020070079721A KR 20070079721 A KR20070079721 A KR 20070079721A KR 20090015417 A KR20090015417 A KR 20090015417A
Authority
KR
South Korea
Prior art keywords
game
hacking
participant
shopping mall
providing
Prior art date
Application number
KR1020070079721A
Other languages
Korean (ko)
Inventor
김기영
Original Assignee
소프트포럼 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 소프트포럼 주식회사 filed Critical 소프트포럼 주식회사
Priority to KR1020070079721A priority Critical patent/KR20090015417A/en
Publication of KR20090015417A publication Critical patent/KR20090015417A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2250/00Postage metering systems
    • G06Q2250/40Data protection

Landscapes

  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A shopping mall-based hacking game service method and a recording medium for recording a program that executes the method are provided to construct a virtual Internet shopping site, and to supply a provided free gift immediately when hacking is successful, thereby offering enjoyment and inducing active participation of participants. A virtual Internet shopping mall site assigned with attacking target products and hacking defending methods of each product is constructed in a network space(S101). If a participant's terminal is connected to the constructed site, authentication is carried out(S103), and information on a hacking game and cyber money are provided to the participant's terminal(S105). During the hacking game, a working screen of the participant's terminal and an image of a gaming place obtained by a separate camera are displayed on a screen(S113). Game results are calculated and displayed on the screen(S119).

Description

Method for providing of hacking game in a based shopping mall and record medium, etc.

The present invention induces the active participation of participants by hacking the game in such a way to acquire a product after varying the difficulty by varying the authentication method and security strength according to the product level in the construction of a virtual internet shopping site And it relates to a shopping mall-based hacking game providing method for providing enjoyment to the general public.

In general, hacking is a malicious act that intrudes someone else's computer, steals information, takes advantage of them, destroys files, or paralyzes the computer network. These hacks can be varied, such as web hacking, network hacking, and system hacking. , Those who do the above are called hackers.

In recent years, the threat of hacking has been increasing. In particular, as part of the cyber security of the defense concept, the interest in hacking technology is increasing.

One of the re-lighting movements of hacking, as known, is called a hacking game.

Conventional hacking games have been conducted in such a way that only a small number of participants can participate, solve a given problem for a very long time (usually more than a week), and rank the solved problems.

However, these hacking games do not provide the public with the fun of watching, and these disadvantages limit the hosting of a wide range of hacking competitions and are local competitions where only a few participants and a few security companies are interested. The meaning has been reduced.

Therefore, the present invention is proposed to solve the disadvantages occurring in the conventional hacking game as described above,

The object of the present invention is to actively participate in the hacking game in such a way as to acquire a product after varying the difficulty by varying the authentication method and the security strength according to the product level in the state of constructing a virtual internet shopping site. The present invention provides a shopping mall-based hacking game providing method to induce participation and provide enjoyment to the general public.

Another object of the present invention is to provide a shopping mall-based hacking game providing method to provide active participation and enjoyment of participants by paying the prize immediately after successful hacking.

Yet another object of the present invention is to provide a shopping mall-based hacking game providing method that relieves the curiosity and multiplies the enjoyment by explaining the attack method to the general public (to viewers) through an interview when the hacking is successful. There is.

Another object of the present invention is to play a hacking game in such a way as to acquire a product after varying the difficulty by varying the authentication method and security strength according to the product level in the state of constructing a virtual internet shopping site, The present invention provides a recording medium in which a program capable of executing a shopping mall-based hacking game providing method to induce active participation and provide enjoyment to the general public.

"Shopping-based hacking game providing method" according to the present invention for achieving the above objects,

Constructing a virtual internet shopping mall site to which an attack target product and a hacking defense method for each product are given in a network space;

Performing authentication when the participant's terminal is connected to the constructed virtual internet shopping mall site, and providing information about the hacking game and cyber money to the participant's terminal after authentication;

Displaying an image of a game room acquired by covering a work screen of a participant terminal and a separate camera during the hacking game on a screen; And

Determining that the game is ended when the hacking is completed or a predetermined time elapses, and calculating and displaying a game result on the screen.

In addition, "shopping-based hacking game providing method" according to the present invention,

It is preferable to vary the difficulty level by varying the security strength of each product according to the level of the target product of attack, and further comprising the step of checking the passage of time when the participant starts hacking using the terminal, the cyber money It is characterized in that the amount of the small amount that can not normally purchase the target product of the attack.

In addition, the calculation method of the game result, the game results are calculated so that the ranking of the participants who have obtained a large number of prizes at the predetermined time, or give a score to the attack target product in response to a predetermined difficulty level, and later It is preferable to calculate the game result so that the ranking is increased by adding up the scores obtained and the result is higher. Alternatively, the game result is calculated so that the ranking of the participant who has obtained a lot of prizes at the predetermined time is high, and the attack is made. The game results are calculated so that the target product is given a grade corresponding to a preset difficulty level, the scores are summed up, and the higher the result is, the higher the ranking is. It is preferable to calculate.

In addition, "shopping-based hacking game providing method" according to the present invention,

After the end of the game further comprises the step of providing an attack method for the hacking success to the viewer, the step is to explain the successful hacking method through the participant and the voice of the participant to capture the video and audio files, and It is preferable to transmit the acquired image file to the screen, and to transmit the audio through the speaker.

According to the present invention, the participants participate actively by hacking a game in such a way as to acquire a product after varying the difficulty by differentiating the authentication method and the security strength according to the product level while constructing a virtual internet shopping site. It has the advantage of inducing and providing the public with the pleasure of watching.

In addition, the successful hacking has the advantage of providing active participation and enjoyment of the participants by paying the provided prize immediately.

In addition, the successful hacking has the advantage of solving the curiosity of the viewers by explaining the attack method to the general public (to observers) through interviews and doubles the enjoyment.

Hereinafter, described in detail with reference to the accompanying drawings a preferred embodiment of the present invention. If it is determined that the detailed description of the known function or configuration related to the present invention may unnecessarily obscure the subject matter of the present invention, the detailed description thereof will be omitted.

1 is a configuration diagram of a system to which a shopping mall-based hacking game providing method according to the present invention is applied, participant terminals (110, 120, 130), communication network 200, hacking game operating server 300, A participant database (DB) 410, a shopping mall database 420, and a hacking database 430 are included.

The participant terminal 110 is a terminal used by a participant who participates in a hacking competition. The participant terminal 110 generally represents a personal computer (PC), and the server of the organizer hosting the hacking competition through the communication network 200 according to the participant's computer operation. After accessing the established shopping mall site through a network, the function performs a function of hacking a shopping mall site where the target prize of prize is provided. Although only three participant terminals are shown in the drawing, this is only one embodiment, and it can be understood by those skilled in the art that more participant terminals can be simultaneously connected simultaneously. Hereinafter, one participant terminal (for convenience of description) The process of proceeding with the hacking game using only 110) will be described.

The communication network 200 is for connecting the shopping mall site operated by the participant terminal 110 and the hacking game operation server 300 in a network environment, and preferably, the Internet is used.

The hacking game operation server 300 builds a virtual internet shopping mall site for a hacking competition in a network environment, controls the participant's authentication and the overall progress of the game, provides game progress information, and calculates a game result after the game is finished. And provide results and provide viewers with video and audio information generated during the interview of successful hacking participants after the game ends.

As illustrated in FIG. 2, the hacking game operation server 300 is in charge of the overall control of the hacking game and the communication module 310 for data communication with the participant terminal 110 through the communication network 200. The control module 320, the participant management module 330 for performing registration and management of participants participating in the hacking game in conjunction with the participant database 410, and a shopping mall database storing virtual internet shopping mall information for the hacking game. The virtual internet shopping mall site is constructed by granting various defense methods for preventing hacking to the virtual internet site where the target of the prize is provided in connection with the hacking database 430 in which 420 and various defense methods for hacking are stored. The shopping mall building module 340 is included.

In addition, the hacking game operation server 300 includes a game result calculation module 350 that calculates a game result after the hacking game ends, and monitors the screen of the participant's work screen or the surrounding situation inside and outside the game room during the game. It further includes a display module 360 for displaying, and a voice processing module 380 for processing voice information obtained through the speaker 382 and outputting the voice information to the speaker 381 during an interview of a successful hacking after the game.

3 is a flowchart showing a "shopping-based hacking game providing method" according to the present invention, comprising: constructing a virtual internet shopping mall site to which an attack target product and a defense method for each product are assigned (S101); Performing authentication when the participant's terminal is connected to the constructed virtual internet shopping mall site, and providing information about the hacking game and cyber money to the participant's terminal after authentication (S103 to S105); When the participant starts hacking using a terminal, driving an internal timer and checking the passage of time (S107 to S109); Displaying the image of the hacking game site obtained by covering the work screen of the participant terminal and a separate camera during the hacking game (S111 to S113); Determining that the game is ended when the hacking is completed or a predetermined time elapses, and calculating and displaying a game result on the screen (S115 to S119); It characterized in that it comprises a step (S121) for providing a spectator an attack on the success of the hack after the game.

In the "shopping-based hacking game providing method" according to the present invention made as described above, the organizer for hosting a hacking competition in step S101 for the hacking game through the shopping mall building module 340 of the hacking game operation server 300 A virtual internet shopping mall site is constructed under a network environment.

That is, the shopping mall building module 340 retrieves shopping mall information (same as the shopping mall information on the general Internet) implemented on the Internet web in conjunction with the shopping mall database 420, and the hacking database 430 to the extracted shopping mall information. In conjunction with this, a virtual internet shopping mall site is constructed by adding a defense method based on the authentication method and the security strength according to the level of the target product. For example, assuming that the target product (commodity that can be acquired by the participants) is a laptop, PMP, or MP3, the laptop product is given a high-security defense method, and the PMP is a defense method applied to the laptop. The lower level defense method is given, and the MP3 may give a lower level method than the defense method applied to the PMP. The application of such a defense is just one example and can be changed according to the characteristics of the participant, the propensity of the organizer and the purpose of the competition.

In the state of constructing a virtual internet shopping mall site for a hacking competition, the participants who want to participate in the hacking competition are registered as in step S103. Here, the participant can register online after accessing the hacking competition site operated by the hacking game operating server 300 through the communication network 200 using the participant terminal 110, and in another way, the participant offline. Registration is possible. Participant registration online is performed in a manner similar to member registration in a general Internet web site, and the participant management module 330 registers the participant's information in the participant database 410 when determined as the participant.

Once registered as a participant, in step S105, the control module 320 transmits the guide information for the hacking game to the web browser of the participant terminal 110, and the guide information for the hacking game is displayed on the monitor of the participant terminal 110. By doing so, the participant becomes aware of information about the hacking game. Here, the guide information about the hacking game includes the target product or the hacking time, and the difficulty or grade of the target product and the score for the target product.

Then, when the participant accesses his participant terminal 110 to the virtual internet shopping mall site operated by the hacking game operation server 300 through the communication network 200, the control module 320 performs the participant authentication process. It is decided whether to participate in the hacking game.

Once determined as a participant in the hacking game, the participant is paid cyber money individually applied to each target product. Such cyber money can be used as information for hacking, and it is a small amount of money that cannot be purchased normally.

When the participant starts the game (S107), the control module 320 checks the progress of the game time by driving an internal timer as in step S109. In this case, the game time elapses in order to confirm whether or not the game ends because the game time is determined in advance for each attack target product. In addition, the time of successful hacking may vary according to the participant's ability, and by measuring and storing the elapsed time, it can be used as result calculation information when calculating a game result later.

As in step S111, the participant performs the hacking game, and in the state where the hacking game is in progress, in order to double the enjoyment of the viewing to the spectator as in step S113, the hacking work screen and the hacking game progress that the participant proceeds. The image of the field is displayed on the monitor 361 through the display module 360. Here, the hacking work screen may be displayed on the monitor 361 by capturing the work screen using a screen capture method, and the image of the hacking game progress scene may be displayed by photographing the surroundings of the hacking game progress scene with a separately installed camera 370. Display on monitor 361 via module 360. In the case of displaying the surrounding situation of the hacking game progress scene in the above, the voice processing module 380 processes the surrounding voice acquired through the speaker 382 and transmits the sound to the speaker 381 or receives the host's voice. After processing in the processing module 380, it is possible to transmit to the speaker 381.

Next, check whether the hacking completion or game time has elapsed in step S115, and if the hacking is completed or the game time is over, go to step S117 to turn off the driven internal timer, go to step S119 and the game result The calculation module 350 calculates a game result.

Here, the method of calculating the game result may calculate the game result so that a participant who has obtained a large number of prizes at a predetermined time may have a higher rank. Alternatively, the game result may be differentially scored in response to a preset difficulty level of the target product. It is also possible to calculate the game results such that the scores are added, and later scores are added up and the higher the result is, the higher the ranking is. In another method, the game result is calculated so that a participant who has obtained a large number of prizes at the predetermined time is high, and the scores are differentially assigned to a target difficulty level and the scores are summed. It is also possible to calculate the game result so that the higher the result value, the higher the ranking, and then sum the two results and calculate the game result with the average value. It is preferable that the hacking game organizer selects and applies a method capable of attracting a large number of participants from various game result calculation methods as well known.

In addition, by displaying the calculated game results on the monitor 361 through the display module 360, viewers can easily and comfortably know the game results and rankings without the inconvenience of checking directly.

Next, the attack method of the successful hacking of the participant in step S121 is provided to the viewer, thereby doubling the enjoyment of the viewer. For example, when a participant describes a successful hacking method through his / her terminal 110 and a voice, the participant acquires a video and audio file by covering it, and the obtained video file is monitored through the display module 360. ) Is displayed on the screen, and the voice is transmitted to the speaker 381 through the voice processing module 380.

On the other hand, by making a shopping mall-based hacking game providing method according to the present invention as a computer executable program and recording on a recording medium, those skilled in the art can easily implement a shopping mall-based hacking game providing method according to the present invention. Will be.

The present invention is not limited to the above-described specific preferred embodiments, and various modifications can be made by any person having ordinary skill in the art without departing from the gist of the present invention claimed in the claims. Of course, such changes will fall within the scope of the claims.

1 is a block diagram of a system to which a shopping mall-based hacking game method according to the present invention is applied.

Figure 2 is a block diagram showing an embodiment of the hacking game operating server of FIG.

3 is a flowchart showing a shopping mall-based hacking game method according to the present invention.

<Explanation of symbols for the main parts of the drawings>

110, 120, 130... Participant terminal

200... Communication network

300... Hack game operations server

310... Communication module

320... Control module

330... Participant Management Module

340... Shopping mall building module

350... Game result output module

360... Display module

380... Voice processing module

410... Participant database

420... Mall database

430... Hacking database

Claims (10)

In the method for providing a shopping mall-based hacking game, Constructing a virtual internet shopping mall site to which an attack target product and a hacking defense method for each product are given in a network space; Performing authentication when the participant's terminal is connected to the constructed virtual internet shopping mall site, and providing information on the hacking game and cyber money to the participant's terminal after authentication; Displaying an image of a game room acquired by covering a work screen of a participant terminal and a separate camera during the hacking game on a screen; And Determining that the game is ended when the hacking is completed or a predetermined time elapses, and calculating and displaying a game result on the screen. According to claim 1, The shopping mall based hacking game providing method, When the participant starts hacking using his terminal, the method further comprises the step of checking the passage of time. According to claim 1 or 2, The shopping mall-based hacking game providing method, The method of providing a shopping mall-based hacking game, characterized by further comprising the step of providing the viewer with an attack method for hacking success after the game ends. The method of claim 3, wherein the providing of the attack method to the viewer comprises a video and an audio file obtained when the participant explains the successful attack method through his terminal and a voice, and the obtained video file is transmitted to the screen. And a voice is transmitted through a speaker. The method according to claim 1, wherein the difficulty level differs depending on the security strength of each product according to the level of the attack target product. The method of claim 1, wherein the cyber money is a small amount of money that cannot be normally purchased for the attack target product. The method of claim 1, wherein the calculating method of the game result comprises calculating a game result so that a ranking of a participant who has obtained a large number of products at a predetermined time is high. The method of claim 1, wherein the method of calculating a game result is differently given a score corresponding to a predetermined difficulty level to the attack target product, and later scores are added to the game so that the higher the result value is, the higher the ranking is. Mall-based hacking game providing method, characterized in that for calculating the result. The method of claim 1, wherein the method of calculating a game result calculates a game result so that a participant who has obtained a large number of prizes at the predetermined time has a high rank, and differentially scores a score corresponding to a difficulty level preset for the target product. The method of providing a shopping mall-based hacking game, characterized in that the game results are calculated so that the ranking is given by adding and obtaining the scores, and the result is higher, and the game results are calculated by summing the two results. . A computer-readable recording medium having recorded thereon a program for executing a shopping mall-based hacking game method according to any one of claims 1 to 3.
KR1020070079721A 2007-08-08 2007-08-08 Method for providing of hacking game in a based shopping mall and record medium thereof KR20090015417A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020070079721A KR20090015417A (en) 2007-08-08 2007-08-08 Method for providing of hacking game in a based shopping mall and record medium thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020070079721A KR20090015417A (en) 2007-08-08 2007-08-08 Method for providing of hacking game in a based shopping mall and record medium thereof

Publications (1)

Publication Number Publication Date
KR20090015417A true KR20090015417A (en) 2009-02-12

Family

ID=40684984

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020070079721A KR20090015417A (en) 2007-08-08 2007-08-08 Method for providing of hacking game in a based shopping mall and record medium thereof

Country Status (1)

Country Link
KR (1) KR20090015417A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102010042795A1 (en) * 2010-10-22 2012-04-26 BSH Bosch und Siemens Hausgeräte GmbH Filter module and method for operating a filter module

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102010042795A1 (en) * 2010-10-22 2012-04-26 BSH Bosch und Siemens Hausgeräte GmbH Filter module and method for operating a filter module

Similar Documents

Publication Publication Date Title
US20200394670A1 (en) Computer system, game system, and game device
US10046240B2 (en) Social networking data augmented gaming kiosk
US20200065853A1 (en) Video-Tournament Platform
JP6346383B1 (en) Interactive event platform
US20180165700A1 (en) Computer system, game system, and game device
US20080020814A1 (en) Broadband gaming system and method
US9117229B2 (en) Generating revenue by growing sales of third-party applications
US10029177B2 (en) System and method for a videogame with a secondary metagame
US11103792B2 (en) Bounded competitions in a video game framework
WO2018076789A1 (en) Method and device for processing interactive application, and storage medium
US20140011594A1 (en) Electronic Social Trivia Game and Computer Application and Related Methods
JP7266446B2 (en) Server system and game system
KR20020091813A (en) Server device for network game, and method and program for managing network game
JP7337004B2 (en) Information control system
KR100903167B1 (en) System for hacking game and method thereof and record medium
JP2017056074A (en) Game system and program
KR20090015417A (en) Method for providing of hacking game in a based shopping mall and record medium thereof
JP2014115855A (en) Game management device, game system, game management method, program, and service management device
JP5566547B1 (en) Program and method for controlling social game system
US20230179836A1 (en) Server, method and terminal
KR20090038762A (en) On-line advertising method using game of expressing win probability
JP2020185170A (en) System for arcade game
JP2024090232A (en) Information processing device, information processing method, and program
JP2024090230A (en) Information processing device, information processing method, and program
KR20090015418A (en) System for analysis soft underbelly of hacking in a based game and method thereof and record medium

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application